Home

Smart & Safe

image

Contents

1. babimu Fotolia com Sebastian Kaulitzki Fotolia com wrw_pixelio de Ivan Floriani Fotolia com Smart Safe ES ui FORUM MOBILKOMMUNIKA bee eee ee ee ee ee ee em em e ef w e em em l a a mm um Dei mm mm cm em mm m m pm cm m pm mm rm em mm r babimu Fotolia com Thommy Weiss_pixelio de Gerd Altmann_pixelio de Jorg Siebauer_pixelio de L
2. MO A SS LA Arbeitsblatt 4 4 N babimu Fotolia com FN FORUM MOBILKOMMUNIKA Smart amp Safe 7 This article dates from the year 2007 Do you think that the problem described therein is still an issue 8 How high do you think is the risk that your personal data is misused 9 What data on your mobile phone do you consider be private and should remain private text messages photos multimedia messages appointments phone numbers BS WS WS OY U list of callers Arbeitsblatt 4 5 63 III Miany new words to be aware of sich einer Sache bewusst sein to bear in sich bergen to contribute something etwas beitragen data protection authority Datenschutzbehorde data trace Datenspur to establish einrichten to estimate abschatzen ermessen free home frei Haus to request fordern requirement Anliegen significance Stellenwert sky rocketing rasant ansteigend surveillance system Aufsichtsstelle to take into account ber cksichtigen technological impact assessment Technikfolgenabsch tzung to weigh something etwas abw gen Ge Overheadfolie 3 64 babimu Fotolia com e8 n 5 F cu The modern human bei
3. EEAAERTERNTER as a security risk You have got time for a quick game are looking for the next bus or tram stop quickly need a water level or want to make a quick price check before you proceed to the cashier s desk No problem Nowadays these small programmes a mobile solution for almost every question However those who act too carelessly when those mini pro grammes might place a little spy into their mobile phone themselves For some programmes access areas of the phone which actually should be off limits for them data to the programme manufacturer that are and should continue to be private S Arbeitsblatt 17 3 150 N babimu Fotolia com En I FORUM MOBILKOMMUNIKA __ E ji Lots of verbs Fill in the correct form of the verb and translate into German infinitive Perfect tense Past tense x German translation Qae O 5 ek gt n CN k gt j FE _ gt jj a gt be
4. data trace toestablish 2 ll eU i ene RA A E A on significance ____________ RA BBB SRV rie A MA A n Wi A 7777 E technological impact assessment 2222222 2 04 CO WME A __ LZ 01122 32 Arbeitsblatt 4 2 60 N O babimu Fotolia com Free home delivery of data Consumers handle their personal data carelessly n view of sky rocketing numbers of electronic services scientists warn of handling private data too carelessly According to a research project of six European institutions on technological impact as sessment among them the Institute for technologi cal impact assessment ITA of the Austrian Academy of Applied Sciences OAW the significance of privacy is underestimated by citizens and enterprises and by politicians According to the experts the high speed of progress in electronic services bears both chances and risks Users of the internet and or mobile phones profit from the possibilities of technology but also leave data traces The scientists request that politics should deal the issue of pri
5. percent 24 percent 222 uu tee here percent MAIS Veen nenne percent in percent 96 200202024 percent 96 12 What happens to apps you no longer use keep them on my mobile phone Qlll in percent 96 e Idelete them in percent 96 e would like to delete them but don t know how to in percent 96 13 What security measures have you taken for the case of a mobile phone loss or theft Iback pmy Gata eeler E in percent 96 l haveactivated my phone lock in percent 96 e lhavenoted the IMEI number in percent 96 EM i Arbeitsblatt 3 3 51 babimu Fotolia com Smart amp Safe mobile phone and me Unless stated otherwise the following results are from the Austrian Internet Monitor Consumer AIM C INTEGRAL Markt und
6. j zn F Arbeitsblatt 17 4 151 babimu Fotolia com Tomasz Trojanowski Fotolia com __ 5 FORUM MOBILKOMMUNIKA Questions on understanding What functions do modern mobile phones offer What can you use them for Have you ever used a free wifi network J Yes J No What should be considered when using free wifi networks LZ Arbeitsblatt 17 s 152 are arrived become chooses close creak dedicate enable follow increase installing making offer protect transmit Use babimu Fotolia com Smart amp Safe Lots of verbs German translation ae Overheadfolie 9 VA infinitive Perfect tense Past tense y 153 babimu Fotolia com IVIobile phone security What are the risks June 17 2011 By Amy Gahran Special to CNN The more people rely on cell phones and tablets the more attractive these devices become as targets to thieves and other nefarious types Fortunately protecting yourself against mobile secu rity risks doesn t require getting paranoid about your phone Rather it s about maintaining good habits watching for red flags and deciding whether you need mobile security tools or services At a recent mobile security conference in San Francis CO staffers from digital security provider Norton outli ned some common current mobile
7. AjUO ue JUSPIDIL ue J Arbeitsblatt 11 2 k f 44 f TA ale 3IA1 S UONEIIUNWWOI e Jo e Ady J AJUO pas0 s JU9JUOY sasodind 6ununoooe 10 15 gt 191489494 pasinpe 15 sem YDIUM euoud y JO uon e20 u ue S AI 2 1 ue J 1294102 ani aS DJ SI 1015 21 JOY api2ap JUBWAJD S 1224102 AY Dpy 3S DJ 10 310 slu uu 1b s y api2a Sal babimu Fotolia com y h n II lt 5 gt S Ea gt f 44 f S D2IAJ S 03 uo passed aq snw yans suoyd e Jo JO pue uosJed e y esne aq ue 1u pl22e ue JI S 3IAJ s 0 uo passed Aew 4215 UMOUY uoud e jo 10 pue e JO 1u91u02 ay esne aq juo ue 1u9pi22e ue J 1 aq ue 19 95991 Buipue1
8. 140 babimu Fotolia com ehrenberg bilder Fotolia com Smart amp Safe 4 FORUM Wh TION Once upon atime Story 1 Nobody s perfect The plot Luke and Matthew get caught by their parents when skipping school because the locating function of their mobile phones has been activated The twins Luke and Matthew are real sports cracks No matter whether in Summer or Winter the two of them are absolutely unstoppable They are very fond of snow boarding Last Christmas they even got smartphones from their parents on which a safety programme is installed which allows to locate them at any time The purpose was not to monitor them but that they could have fun on the slopes alone and that in case of an emer gency aid could be sent to them quickly At the moment however Luke and Matthew have anything but a case of emergency on their mind Actu ally they think of a case of school skipping due to Spring Spring has finally arrived and the day is far too nice to spend it at school Story 2 Burglary made easy The plot While Elias is on holiday with his family burglars enter their flat Eventually it turns out that the burglars knew that the family would be on holiday due to Elias s social network profile Elias is very fond of Facebook and Twitter He regularly posts new photos with his smartphone and informs his many friends of whom he only knows a few personal ly about everything they had always wa
9. e E e og Te a En en 1 1 _ _ _ 2222 m E un mn mm wn 2 vm A A 2 22 2 et babimu Fotolia com Klaus Eppele Fotolia com Amir Kaljikovic Fotolia com __ E Have you heard Read through the descriptions and then try to summarise the described problem in one sentence An app with hidden possibilities Paul S was excited thanks to a new app he was able to integrate his private photos into the film sets of recent blockbusters by pressing just one button He had never ever sent as many multimedia messages like after he had installed this app All his friends could admire themselves side by side with their movie heroes However an unpleasant surprise was soon to come What Paul S did not know was that the app was far more powerful And he himself had allowed the app and its operators to be so powerful In order to be able to install the app Paul S had to give the app operators some authorisations among other things access to his personal contacts and his call list Data protectors now assume that such data was not only collec
10. If your mobile phone was stolen you should report the theft to the police in any case Every mobile phone has an IMEI number i e a 15 digit serial number that is allocated only once and cannot be deleted You can find it below the battery and on the original packaging of your mobile phone moreover you can retrieve it by entering the code 06 You should note down the IMEI number in any case and tell it to the police in the case of a theft If the police ind your mobile phone in the course of an investigation or if it is depo sited at the lost and found office it can be made clear whether it is your mobile phone or not thanks to the IMEI number even if all your personal data has been deleted and your old SIM card has been removed A blessing in disguise If you lose a mobile phone you lose not only lots of data blocking and issue of a new SIM card as well as the purchase of a new mobile phone cost a lot of money When you submit the theft report some mobile radio providers charge you nothing for blocking the SIM card and issuing a new one Words to help you to block sperren to require anfordern verlangen balance Gutschrift to remain ver bleiben bestehen bleiben to allocate zuweisen vergeben to retrieve abrufen to issue ausstellen SE Arbeitsblatt 20 177 babimu Fotolia com Volodymyr Krasyuk Fotolia com Smart amp Safe b nM FORUM MOBILKOMMUNIKA
11. VA Vokabelliste 1 requirement retention of data satellite system secrecy security lapse security risk sensitive data signal transit time significance sky rocketing space storage place store card subscriber surveillance system sweepstake technological impact assessment theft to allocate to apply to ascertain to avoid to be aware of to bear FM Missbrauch Handy Mobilfunkbetreiber Mobilfunkstation Betriebssystem pers nliche Daten Telefonspeicher Richtfunk Staatsanwalt Funkzelle Funkvermittlungsstation Funkwelle Empfang Anliegen Vorratsdatenspeicherung Satellitensystem Geheimhaltung Sicherheitsl cke Sicherheitsrisiko sensible Daten Signallaufzeit Stellenwert Bedeutung rasant ansteigend Weltall Speicherplatz Kundenkarte Teilnehmer Aufsichtsstelle Gewinnspiel Technikfolgen abschatzung Diebstahl zuweisen vergeben zutreffen ermitteln vermeiden sich einer Sache bewusst sein in sich bergen KOMMUNIKATION babimu Fotolia com to block to charge verrechnen to contribute to U zu etwas beitragen something to create produzieren to delete 8 7 to maintain gerichtlich verfolgen to provide versorgen bestehen bleiben angeben erklaren behaupten Ste Vokabelliste 2 196
12. WOD JO JUBUOCdWOD e Adu J 15 JU9JUOY panes 1snui 5 sasodind 6ununoooe 104 pasojs aq 5 19489194 A o1erpauuuul pesiApe aq 1snuu sAemje Sem 24 UDIUM euoud au Jo uone o ay 189 ue S AI 2 1 DINOS ue J dau aunsua 5 y pue JOU BU JI pesiApe eq uone o 94 kk X _ U UJI9161S 1391109 9S 8J ani 23333 Sal 118 Overheadfolie LA lt babimu Fotolia com julien tromeur Fotolia com Smart amp Safe EMN FORUM MOBILKOMMUNIKATION Big Brother On 1 April 2012 retention of data became the law in Austria Providers of public communications services now have to store certain data generated when their customers use mobile phones land line phones e mail and the internet for a period of six months Storage of such data serves the exclusive purpose of investigating ascertaining and prosecuting crimes that are subject to punishment by imprisonment for more than one year A reasoned request by the public prosecutor or by the criminal police is sufficient for an inquiry of master data an independent public prosecutor must give his consent to such a request Justice and the police in principle need the approval of a court t
13. access your mobile phone And this may happen without you knowing it at once As we know open doors usually do not However free can be dangerous You can use them to surf on the internet for free however clever criminals with some technical expertise your banking transactions if you use this free possibility to access the internet Otherwise the free web can be rather expensive SE Arbeitsblatt 17 2 149 babimu Fotolia com Tomasz Trojanowski Fotolia com FM FORUM MOBILKOMMUNIKATION Smartphones are about to take the lead An increasing number of customers one of the new clever mobile phones which in many areas already replace the or notebook Therefore this target group becomes more and more interesting for programmers who their work to the production or 5 u uuu u u u MR ____ _____6_6______ MEDIUS Although there are still very little known viruses worms and Trojans that attack mobile phones experts expect this number to significantly in the next years As the saying goes The bigger the market the greater the variety of offers Finally one must also consider the highly acclaimed and popular
14. so she gives Bernhard E the list g Yes this is allowed under the Austrian Data Protection Act O No this is prohibited by the Austrian Data Protection Act Reason SE Arbeitsblatt 7 3 EMN FORUM MOBILKOMMUNIKATION 103 babimu Fotolia com Wilhelmine Wulff_pixelio de EMN FORUM MOBILKOMMUNIKATION Time to vote Two days before the Parliamentary Elections is Sandra 5 5 sixteenth birthday This means that she may go to an election for the first time Three weeks before the elec tion she receives a letter personally addressed to her which contains an information leaflet published by the President of the Nationalrat National Council of the Aus trian Parliament which informs her about the tasks of the Nationalrat and reminds and asks Sandra to exercise her right to vote at the next election Yes this is allowed under the Austrian Data Protection Act No this is prohibited by the Austrian Data Protection Act EM wa Arbeitsblatt 7 4 104 babimu Fotolia com Benjamin Thorn_pixelio de Salih Ucar_pixelio de Templermeister_pixelio de frequently take part in sweepstakes It is obvious that have to state some of my personal data the organisers of the sweep Stakes need to know how to contact the winner sometimes take part in market surveys and opinion polls Often you get goods for free sometimes even some money It is clear that state no
15. um 0 7 C gt lt gt 75 E 5 9 gt A EA Arbeitsblatt 21 1 181 babimu Fotolia com It provides the mobile phone not only with reception but also helps to locate it An April fool s joke Not at all This is no hoax this is to fight crime Therefore it has become law Aus tria since 1 April 2012 Its name reflects its aim It provides information about where a mobile phone is located The name alone shows that this interface for data transmission via radio is by no means toothless as re gards data security it likes to show its teeth and makes naive interface users sometimes look quite pale The individual Member States are free to decide how to implement it in detail However if it is not imp lemented by a national law within the prescribed period as it was the case in Austria with retention of data the Member State in default is adjudicated Sounds like an up to date service on traffic jams Actually it provides information about when you were connected with whom via the mobile phone and for how long If necessary withdrawing this little chip from circulation protects you from further damage In the past this was an issue especially with computers Today it makes every smartphone a small PC And as the smartest mobile phone does not work if it is defective a special focus is laid thereon already when buying a mobile phone It is no
16. Access Points A particular problem in businesses is the deployment of rogue access points Someone in a department may want to set up a wireless network in the office similar to what they have at home If they are unwilling to wait for the information technology IT department to set one up or worse if they are unwilling to contact the IT department at all such an installation may open the Smart amp Safe business up to network hacking This is especially true if they do not activate any security protocols such as WEP or WPA Every business should have network mo nitoring tools in place to detect rogue access points Man in the Middle Attacks Wireless hot spots are very popular and many restau rants offer free Internet access via their wireless net work Unfortunately cyber criminals also frequent the se establishments By setting up a wireless network ID that looks like what a customer might be expecting they lure the unsuspecting victim into connecting to their network From that point the interceptor just forwards the network requests on to legitimate desti nations while rummaging through the victim s laptop and stealing vital personal information It is best to be alert when frequenting such a place and be aware of any suspicious activity Also be sure to connect to the business s valid network ID Jamming Jamming occurs when a signal stronger than the si gnal produced by a wireless access po
17. For example if an application is transmitting data over an unencrypted WiFi network using http rather than secure http the data can be easily intercepted When a wireless transmission is not encrypted data be easily intercepted e m m E e 2 p Infoblatt 2 2 Mobile devices may contain malware Consumers may down nM FORUM MOBILKOMMUNIKA Mh load applications that contain malware Consumers down load malware unknowingly because it can be disguised as a game security patch utility or other useful application It is difficult for users to tell the difference between a legitimate application and one containing malware For example an ap plication could be repackaged with malware and a consumer could inadvertently download it onto a mobile device The data can be easily intercepted When a wireless transmission is not encrypted data can be easily intercepted by eaves droppers who may gain unauthorized access to sensitive information Mobile devices often do not use security software Many mobile devices do not come preinstalled with security soft ware to protect against malicious applications spyware and malware based attacks Further users do not always install security software in part because mobile devices often do not come preloaded with such software While such software may slow operations and affect battery life on some mobile devices without it the risk may be increa
18. Meinungsforschung questioned a represen tative group of Austrian people 12 000 persons 3 000 a quarter The respondents were at least fourteen years old www integral co at de downloads f AIM Do you have an web enabled mobile phone e 24 of all Austrian women older than fourteen years owning a mobile phone have a web enabled mobile phone e 19 of all respondent women use the internet on their mobile phones e 30 of all respondent men use the internet on their mobile phones e 50 of all respondents between fourteen and nineteen years use the internet on their mobile phones 3196 of the respondents between thirty and thirty nine and 25 of the respondents between forty and forty nine use the internet on their mobile phones Most common activities on the internet activities surf the internet 1 weather report e mails route planners Disposal of mobile phones A survey of the Aris polling firm carried out with 1 000 German respondents older than fourteen years in November 2011 showed that two out of three owners of mobile phones 66 67 keep their old phone when they get a new one Every third female respondent 33 gives her phone away as a gift Lost mobile phones Robbery of mobile phones is an offence committed more and more frequently in Aus tria according to the Federal Office of Criminal Investigations Bundeskriminalamt in 2011 2096 more mobile phones were robbed in Austria than in the year befor
19. Why is such data stored 5 How can be ensured that retained data is not misused Words to help you retention of data Vorratsdatenspeicherung to ascertain ermitteln to prosecute gerichtlich verfolgen public prosecutor Staatsawalt consent Zustimmung approval of court richterliche Zustimmung legal protection Rechtsschutz subscriber number Teilnehmernummer call forwarding Rufweiterleitung call redirection Rufumleitung commencement Beginn LL Arbeitsblatt 12 120 babimu Fotolia com julien tromeur Fotolia com Smart amp Safe Pros amp Cons Collect arguments in favour of and against the retention of data what are the advantages what disadvantages may arise ofl SE Arbeitsblatt 13 Gi d FORUM MOBILKOMMUNIKATION AER babimu Fotolia com Smart amp Safe Know how Locating mobile phones via radio cells Many individual mobile radio stations each of which is equipped with a mobile radio antenna ensure that you can be reached everywhere on your mobile phone For your mobile phone regularly contacts the nearest mobile radio antenna by means of radio waves The phone informs the radio station that it is still within its range Even if you make no calls and send no text messages So every mobile radio station knows which mobile phones are turned on within its range This area which pr
20. average every app user has already deleted eight apps s he no longer uses Overheadfolie 2 2 gt NV js babimu Fotolia com Free home delivery of data Consumers handle their personal data carelessly n view of sky rocketing numbers of electronic services scientists warn of handling private data too carelessly According to a research project of six European institutions on technological impact as sessment among them the Institute for technologi cal impact assessment ITA of the Austrian Academy of Applied Sciences OAW the significance of privacy is underestimated by citizens and enterprises and by politicians According to the experts the high speed of progress in electronic services bears both chances and risks Users of the internet and or mobile phones profit from the possibilities of technology but also leave data traces The scientists request that politics should deal the issue of privacy eaa Unforeseeable consequences Although many users are aware of how much per sonal information they disclose when using in formation and communication technologies one cannot expect them to be able to estimate long term consequences Therefore Walter Peissl of the ITA requests a higher degree of sensitivity of the users LZ SE Arbeitsblatt 4 of electronic services as regards the issue of privacy In their project report the scientists found that the protection o
21. come What Paul S did not know was that the app was far more powerful And he himself had allowed the app and its operators to be so powerful In order to be able to install the app Paul S had to give the app operators some authorisations among other things access to his personal contacts and his call list Data protectors now assume that such data was not only coll ected but had also been passed on And Paul S now is afraid that he and his friends will in future re ceive loads of spam text messages and that his private photos may appear on any given websites Missed calls can be expensive Sandra S hardly could believe her eyes when she looked at her last mobile phone bill she had been charged EUR 30 for calls to value added service numbers which she just could not explain to herself She calmed down and called the billing hotline of her mobile radio provider Only when they asked for calls from unknown numbers she remembered the missed calls she had found on her mobile phone some time ago She had always tried to call back but had only reached weird answering ma chine loops Obviously she had called value added services without noticing it Her contact at the hotline offered her to block her mobile phone for value added service numbers SE Arbeitsblatt 22 N EMN FORUM MOBILKOMMUNIKATION 187 babimu Fotolia com Yuri Arcurs Fotolia com EMN FORUM MOBILKOMMUNIKATION Free app be e
22. good neither for you nor for your mobile phone You both fall ill if you catch one When typing it in you get certain information from your mobile phone For example if you type in 06 the IMEI number of your mobile phone is displayed which is unique and unmistakable A brand new mobile phone has them And only them If they are restored everything else is deleted SS Arbeitsblatt 21 2 FORUM MOBILKOMMUNIKATION 182 babimu Fotolia com Volodymyr Krasyuk Fotolia com A 183 FORUM MOBILKOMMUNIKATION is d coca Overheadfolie 11 Smart amp Safe gt EM yes Y babimu Fotolia com Klaus Eppele Fotolia com Amir Kaljikovic Fotolia com Smart amp Safe Be smart aD The following cases were part of the introduction into the topic of data protection Now that you a professional in mobile data protection it is up to you Create tips what to do to avoid the described risk An app with hidden possibilities Paul S was excited thanks to a new app he was able to integrate his private photos into the film sets of recent blockbusters by pressing just one button He had never ever sent as many multimedia messages like after he had installed this app All his friends could admire themselves side by side with their movie heroes However an unpleasant surprise was soon to
23. outbox Only when she called her mobile radio provider she learned that she had already exceeded the number of included free text messages and that approx 300 text messages had been sent from her mobile phone per day Hello here am Luke Matthew and Jacob three students from Deutschlandsberg had planned eve rything very well They started off on time in the morning and instead of going to school then went to the train station They took the 8 05 train and went to Graz they had planned to go shopping instead of attending school They had even thought of changing their Facebook status several times during their little trip always using similar phrases like feel sooo sick Thanks to their new smartphones this was no problem at all However they had overlooked the fact that on their Facebook sites they had activated the function to automatically detect their location and state it on their profile together with every new status message So their status messages read feel sooo sick however Graz and not their home town was stated as their location on all three profiles So the three truants got caught very quickly thanks to their digital lead SE Arbeitsblatt 1 2 N FM FORUM MOBILKOMMUNIKATION 40 babimu Fotolia com Lasse Kristensen Fotolia com Murat Subatli Fotolia com Smart amp Safe FORUM MOBILKOMMUNIKA Alter ego Florian E w
24. their location on all three profiles So the three truants got caught very quickly thanks to their digital lead SE Arbeitsblatt 22 2 188 babimu Fotolia com Lasse Kristensen Fotolia com Murat Subatli Fotolia com Smart amp Safe bn FORUM MOBILKOMMUNIKA n Alter ego Florian E was very happy with his new smartphone He was so happy that he did not even think about his old mobile phone any more which he had sold with pro fit Until last Friday when his colleague left the office and said Don t go too far Loverboy85 Mr E first looked puzzled then after he had asked several times his colleague felt pity for him and explained what this Loverboy thing was all about He showed Mtr E the profile of a single man with the username Loverboy85 on a well known online dating portal And this profile was actually loaded with private photos of Mr E Mr E made some research and found out that the buyer of his old smartphone had found the photos had created a profile on the online portal just for fun Zeynep K amp the subscription Zeynep K always wanted a new ringtone So she was thrilled when she found her favorite song for download as a ringtone in a new app Was also quite easy She only had to confirm Buy and could download her new ringtone The rude awakening came quickly however Because suddenly the entire balance was used up on her prepaid card With her click
25. threats Malware This is an app contaminated with malicious code that makes your phone do things it shouldn t such as ste al your personal data While no smartphone platform is immune from malware so far Android apps appear to present the greatest malware risk This is because of the openness of this platform and Google s Android market This week The Register reported on the latest rash of Android malware and noted that Google has admit ted that more than 90 percent of Android users are running older versions of the mobile operating sys tem that contain serious kernel vulnerabilities That gives attackers an easy way to bypass Android s secu rity sandbox which is supposed to limit the data and ILL Infoblatt 2 1 resources each app is allowed to access At the Norton conference a presenter demonstrated how quick and easy it is to trojanize an Android app He downloaded an existing legitimate app from the Android Market viewed the source code copied in some malicious code renamed the app and uploaded the now malware to the market all in about three minutes Mobile security tools such as Lookout or Norton Mo bile Security in beta can help guard against Android malware by scanning apps and other programs and data on your phone However the best way to protect yourself against mal ware is to read the list of permissions that an Android app requests before you install it Does that list make sense F
26. to finally delete Overheadfolie 10 ATs FORUM MOBILKOMMUNIKA 175 babimu Fotolia com g FORUM SEN Mh EE _ te __ E ji Help mobile phone is gone You have looked for it everywhere have tried to call yourself but it still has not turned up This does not happen to you alone Around 80 mobile phones are stolen in Austria every day others are mis placed or simply lost Mobile phone is gone Have the SIM card blocked No matter whether it was stolen or whether you just lost it in order to keep the damage as low as possible you should have the SIM card blocked as soon as possible Why is it important to block the SIM card What can you prevent by blocking it blocking hotlines All Austrian mobile radio providers offer hotlines for blocking mobile phones in some cases you can enable blocking also via 1 0800 664 100 Bob 0900 680 680 Please note non registered pre paid mobile phones cannot Drei 0800 30 30 30 be blocked Any remaining balance is lost toge eety 0681 83083 ther with the mobile phone A remaining balance Orange 0699 70 699 on registered pre paid mobile phones will remain tele ring 0820 650 650 after the SIM card has been blocked and can be transferred to the new SIM card Tele2mobil 0800 240020 T Mobile 0676 2000 yesss 0820 810 810 Stolen Report the theft to the police May 2013
27. 012 pdf N Arbeitsblatt 11 4 135 babimu Fotolia com 116 yoamzsbunuyray sasodind dau sp oy y h SadIAJas ADUdHJaWA UO passed aq yons UMOUY euoud e 10 pue uosJed ule e JO 1u91u02 ay asNedaq juo ue 1u9pi22e ue J n II m lt x 5 gt S EQ buipue1sino Us S Iq JI USAS su1uouJ JIU 19118 Isnw sasodind 6ununoooe JeoJsuen e UNS JO AjISS9D9U y JO e gt 9y Jaye sardiAjas O AJUO uone o pue uo ssed suone iunuuulo29 a e aq 0 UO passed Ja sew sese U lt DUas JapJo ul 32013002 e JO Jaye osje JaJseyy Sesodund sesudio1ue 19910 O pjos SadIAJas O uo passed yans UMOUY BUOY Jou siu Jo Jo pue UOSJad e jo ay
28. 7 4 EMN FORUM MOBILKOMMUNIKA PRIVATE no access personal data sensitive data identity theft transparent individuals locating of cell Phones spam text message gt retention of data Overheadfolie 1 29 babimu Fotolia com Dan Race Fotolia com Thorsten Freyer_pixelio de Benjamin Klack_pixelio de __SmartSSafe FORUM MOBILKOMMUNIKA Mh 4 r
29. as very happy with his new smartphone He was so happy that he did not even think about his old mobile phone any more which he had sold with pro fit Until last Friday when his colleague left the office and said Don t go too far Loverboy85 Mr E first looked puzzled then after he had asked several times his colleague felt pity for him and explained what this Loverboy thing was all about He showed Mtr E the profile of a single man with the username Loverboy85 on a well known online dating portal And this profile was actually loaded with private photos of Mr E Mr E made some research and found out that the buyer of his old smartphone had found the photos had created a profile on the online portal just for fun Zeynep K amp the subscription trap Zeynep K always wanted a new ringtone So she was thrilled when she found her favorite song for download as a ringtone in a new app Was also quite easy She only had to confirm Buy and could download her new ringtone The rude awakening came quickly however Because suddenly the entire balance was used up on her prepaid card With her click on Buy she not only ordered one ringtone but a full subscription SEE Arbeitsblatt 1 3 41 babimu Fotolia com FN __ E ji FORUM MOBILKOMMUNIKA Miy mobile phone and me 1 My gender O male J female 2 Can you access the internet with your phone J Y
30. between the age of 14 and 27 send approx 15 text messages and make phone calls for 37 5 minutes per day This way quite a lot of traffic data and location data is created What about you Do you always carry your mobile phone with you like 80 of all owners of mobile phones in Austria Even more so what traffic data and location data do you create on an average day Enter every call you make and every message you send in one day into the table below j e 2 Explanation means incoming calls and or messages you receive means outgoing calls 2 a and messages you make send Text Multi media message Dura Out Time tion in Time min My communication partner My location y A TEN p uone o pue eyep gt uoud lIqOLu jnoK JO II lt gt EE s e x E gt Ea osje sunno AUER nok sMOU o uoneinp pue Kou nb 1 941 Arbeitsblatt 10 euo JO ue 196 ue NV x H dle f EM ES nok SMOUN 5 jl babimu Fotolia com jSaSD1Yd 1224402 34 12 eouoOmnoeuuoo yiu aut was babimu Fotolia com Smart amp Safe Free access The legal situation The Austrian Telecommunications Act Telekommunikationsgesetz regulates which data a telecommu
31. e ex pressed in figures these are 444 mobile phones wa lt Overheaofolie 2 54 babimu Fotolia com s kounadeas Fotolia com Smart amp Safe FORUM MOBILKOMMUNIKA Owners of smartphones 32 of all Austrian women older than fourteen years owning a mobile phone have smartphone In the course of the German JIM survey 1 208 young people between twelve and nine teen years were questioned in 2010 The survey arrived at the following result 1496 of all respondents have a smartphone 1196 of the girls and 1696 of the boys Apps on the mobile phone 2096 of all Austrian women older than fourteen years owning a mobile phone have installed apps 1296 of female owners of mobile phones and 2896 of male owners of mobile phones 4296 of all male and female mobile phone users between fourteen and nineteen years have installed apps 2896 of the respondents between thirty and thirty nine years and only 1696 of the respondents between forty and forty nine years have installed apps Number of apps The average Austrian app user older than fourteen years has installed ten apps on his her phone of which six are used regularly Top three of apps The apps most popular among Austrian app users come from the areas of navigation 72 weather 64 games 60 social networks 57 What happens to apps longer used Most Austrian app users delete programmes they no longer use On
32. ecurity make phone calls from the mobile phone they cont rol They can write messages and send them from the phone and they can even eavesdrop on private con versations As with any mobile device there are important pre cautions you can take to protect yourself against Blue tooth security breaches on a mobile phone Always disable Bluetooth functionality on your phone when it s not in use Protect your phone with mobile antivirus soft ware By simply turning off Bluetooth hackers are unable to mount your handset s commands or access the infor mation on your Bluetooth enabled mobile phone www kaspersky com threats bluetooth risks 2 SE infoblatt 2 4 FM FORUM MOBILKOMMUNIKATION y 167 babimu Fotolia com Flit the nail on the head Text Rating according to the school grades system 1 very good 5 failed Bluetooth Se e us malware The title is meaningful The introduction makes you read more The description of risks is correct is comprehensible is suitable for peo ple older than 70 Security advice is correct is comprehensible is suitable for peo ple older than 70 Image If graphical elements were used they are valuated according to the school grades system Bluetooth StL malware networks How well do the graphical elements support the message s of the text Are they suitable for the target group The target group Is the in
33. ed it may soon happen that unwanted intruders stand right in the middle of your flat i e access your mobile phone And this may happen without you knowing it at once As we know open doors usually do not creak However be dangerous You can use them to surf on the internet for free however clever criminals with some technical expertise can follow every step you take on the internet Therefore you should rather be double careful in using passwords going online shopping or making your banking transactions if you use this free possibility to access the internet Otherwise the free web can be rather expensive Smartphones are about to take the lead An increasing number of customers chooses one of the new clever mobile phones which in many areas already replace the PC or notebook Therefore this target group becomes more and more interesting for programmers who dedicate their work to the production of so called s P Although there are still very little known viruses worms and Trojans that attack mobile phones experts expect this number to increase significantly in the next years As the saying goes Ihe bigger the market the greater the variety of offers Finally one must also consider the highly acclaimed and popular sees as a security risk You have got time for a quick game are looking for the next bus or tram stop quickly need a water level or want to ma
34. es J No 3 What do you do when going online with your mobile phone Rate the suggested options with 1 to 5 1 stands for very often 5 stands for very rarely C surf the internet C send and receive e mails C check the weather report C check my profile on Facebook Twitter etc C use route planners e g Qando of the Verkehrsverbund Ost Region VOR public transport association for the Eastern region of Austria 4 What do you do if you do not need your mobile phone any more J throw it away I give it to one of my relatives friends Idonate it For example O it at home O Isell it J I give it to recycling 5 Do you check what data still is stored on your phone before you replace it J Yes J No 6 Have you ever lost your mobile phone or has it been stolen O Yes J No If so what did you worry about most when it was gone J That was not able to make phone calls more J That had lost all my phone numbers J That had lost all my photos J That could not send text messages any more J That did not know who might have found my phone SE Arbeitsblatt 2 1 LA 44 N babimu Fotolia com ioannis kounadeas Fotolia com Smart amp Safe 7 Have you ever received any unwanted advertising text messages J Yes J No 8 Do you have a smartphone J Yes J No 9 Can you install apps on your mobile phone J Yes J No If so 10 Ho
35. eset is not possible I use an app to finally delete the phone memory Now my little sister can be happy and can revive my old mobile phone with loads of fresh data If a factory reset is possible for my mobile phone I choose this method This way can be sure that my personal data cannot be restored Then check the user manual of my phone for how to finally delete my personal data Thereby must consider that there are three different memories the SIM card the internal phone memory and additional memory cards First make a backup of all data do not want to lose SE Arbeitsblatt 19 174 babimu Fotolia com Klaus Stricker_pixelio de Benjamin Klack_pixelio de Thommy Weiss_pixelio de Gerd Altmann_pixelio de hbertdsign at_pixelio de Thorben Wengert_pixelio de _ SmartS Safe fj Thereby must consider that there are three different memo ries the SIM card the internal phone memory and additional memory cards Then check the user manual of my phone for how to finally delete my personal data If a factory reset is possible for my mobile phone choose this method This way can be sure that my personal data cannot be restored the phone memory remove the SIM card and any additional memory cards Now my little sister can be happy and can revive my old mobile phone with loads of fresh data 5 If a factory reset is not possible l use app
36. f privacy often is weighed against values such as comfort security economic advantages or social interaction The experts are convinced that many problems in connection with privacy could be avoided For this purpose the requirements of data protection must be taken into account at an earlier point of time i e already in the design and development of electronic offers Obligatory privacy impact assessment could contribute thereto When collecting personal data the following prin ciple should always be followed As little as possible and only as much as necessary Monitoring institu tions should be established for surveillance systems Moreover citizens should be given simple access to the data stored about them Last but not least data protection authorities should be given more compe tences and resources Source of the German version of the text www wienerzeitung at nachrichten panorama chro nik 106034 Daten frei Haus html FM y 59 babimu Fotolia com In this text there are many new words Can you match the German translation to the right word Datenschutzbeh rde etwas beitragen e Sich einer e rasant ansteigend Aufsichtsstelle Der cksichtigen H tobeaware Of 0 2 to bear a MBB i 77 to contribute something w 7 n m data protection authority ff
37. formation leaflet suitable for aged people older than 70 accept sufficient insuffi e doce 0056 able cient wa j j mme LT PP SE Arbeitsblatt 18 4 N 170 O babimu Fotolia com Bluetooth wifi networks malware Bluetooth wifi networks malware Overall valuation How well is the information leaflet suited to make aged people older than 70 fit for using mobile phones accept insuffi very good good Eu sufficient eer ee z t mme Did we manage not to raise fears to convey competence and security in using mobile phones insuffi sufficient Bluetooth 1 EE Arbeitsblatt 18 2 CC WA 171 N babimu Fotolia com Klaus Stricker_pixelio de Benjamin Klack_pixelio de Thommy Weiss_pixelio de Gerd Altmann_pixelio de hbertdsign at_pixelio de Thorben Wengert_pixelio de EMN FORUM MOBILKOMMUNIKATION Erased and deleted forever You got a new smartphone as a birthday present and now generously give your old phone to your little sister However you only want to give her your phone but not your contacts photos texts and multimedia messages What to do In what order do you take the following steps Put the sentences in the correct order d remove the SIM card and any additional memory cards If a factory r
38. ghts of homosexuals Membership in a political party Religion Nationality SCH MN D Overheadfolie 5 NN 70 babimu Fotolia com EMN FORUM MOBILKOMMUNIKATION Deserving special protection The Austrian Data Protection Act regulates who may use which data which steps must be taken by Austrian enterprises to guarantee data security and which national institutions monitor data protection Moreover there is a separate part on video surveillance Answer the following questions using the Austrian Data Protection Act Article 1 of the Austrian Data Protection Act stipulates the right to secrecy of your data To which data is such secrecy related What restrictions are defined What are your rights concerning your data 2 Which part and or section defines data deserving special protection 5 Article 2 defines exceptions from the duty to maintain secrecy Which part and which section s contain s those exceptions Words to help you to stipulate festlegen secrecy Geheimhaltung data deserving special protection besonders schutzw rdige Daten to maintain erhalten wahren SE Arbeitsblatt 6 72 74 gt babimu Fotolia com Julien Christ_pixelio de Konstantin Gastmann_pixelio de Smart amp Safe Who may do what 80 at last Margit N organises a birthday party for her grandmother s 80th birthday She has invited all relatives to the
39. iche Zul ssigkeit des Auskunftsbegehrens 2 Ist eine aktuelle Standortfeststellung nicht m glich darf die Standortkennung Cell ID zum letzten Kommunika tionsvorgang der Endeinrichtung des gef hrdeten Menschen verarbeitet werden auch wenn hierf r ein Zugriff auf 8 102a Abs 3 Z 6 lit d gespeicherte Vorratsdaten erforderlich ist Der Anbieter hat den betroffenen Teilnehmer ber eine Auskunft ber Standortdaten nach dieser Ziffer fr hestens nach 48 Stunden jedoch spatestens nach 30 Tagen grunds tzlich durch Versand einer Kurzmitteilung SMS wenn dies nicht m glich ist schriftlich zu informieren Diese Information hat zu enthalten a die Rechtsgrundlage b die betroffenen Daten c das Datum und die Uhrzeit der Abfrage d Angabe der Stelle von der die Standortfeststellung in Auftrag gegeben wurde sowie eine entsprechende Kon taktinformation Verkehrsdaten 8 99 1 Verkehrsdaten d rfen au er in den in diesem Gesetz geregelten F llen nicht gespeichert oder bermittelt wer den und sind vom Anbieter nach Beendigung der Verbindung unverz glich zu l schen oder zu anonymisieren 2 Sofern diesf r Zwecke der Verrechnung von Endkunden oder Vorleistungsentgelten erforderlich ist hat der Be treiber eines ffentlichen Kommunikationsnetzes oder dienstes Verkehrsdaten zu speichern Die Verkehrsdaten sind zu l schen oder zu anonymisieren sobald der Bezahlvorgang durchgef hrt wurde und innerhalb einer Frist v
40. int WAP is disrupted This can be done deliberately by someone with bad intentions or it can happen inadvertently if other wireless devices nearby interfere with the WAP s signal Baby monitors cordless phones and cell pho nes are all capable of jamming the signal of a wireless access point Whether intentional or unintentional jamming disrupts the wireless network and interferes with its proper operation www ehow com list 6684310 wireless lan security risks html lt SS Infoblatt 2 3 166 babimu Fotolia com Attacks on Bluetooth enabled devices can take place within a distance of 10 metres or more As many as three quarters of mobile phone users are not aware of the internet security risks linked to Bluetooth equipped devices These risks come in four main guises Bluejacking is when anonymous text messages are sent to mobile phones e Bluespamming is when a phone s contacts are secretly sent text messages Bluesnarfing is when hackers gain access to a mobile phone s contacts e Bluebugging is when hackers have access to a handset s commands While each of these risks is a nuisance bluesnarfing and bluebugging are particularly serious With blues narfing hackers can gain access to stored data such as a phonebook calendar or to clone a phone Bluebugging on the other hand allows hackers to am m e e Smart amp Safe Mobile phone s
41. ke a quick price check before you proceed to the cashier s desk No problem Nowadays these small programmes offer a mobile solution for almost every question However those who act too carelessly when installing those mini program mes might place a little spy into their mobile phone themselves For some programmes access areas of the phone which actually should be off limits for them and transmit data to the programme manufacturer that are and should continue to be private SN F Arbeitsblatt 17 4 148 LA N babimu Fotolia com mipan Fotolia com Smart amp Safe All safe This text is about security risks that may lure when mobile phones are used too carelessly are arrived be become chooses close creak dedicate enable follow increase installing led making offer protect transmit use risks However those who familiar with those risks and know how to their data against misuse can the full range of functionalities of modern mobile phones One potential security lapse are nennen RT not only an easy exchange of data but also are a door into your mobile phone If you do not this door after the guests you expected iH UD an it may soon happen that unwanted intruders stand right in the middle of your flat i e
42. ne of my relatives in percent 96 Ee Tm percent 96 e keepitathome in percent 96 percent 96 Te y CIS Ro in percent SE Arbeitsblatt 3 4 49 babimu Fotolia com Light Impression Fotolia com HIN FORUM MOBILKOMMUNIKATION a 5 Do you check what data still is stored on your phone before you replace it Ce MES 55 in percent 06 e LE in percent 6 Have you ever lost your mobile phone or has it been stolen 2 2222 0 0660 o ____ in percent in percent 06 If so what did you worry about most when it was gone e That was notable to make phone calls any more in percent 96 e TIhatlhadlostall my phone numbers in percent 96 e Thatlhadlostallmy photos in percent 96 That could not send text messages any more in percent 96 e That did not k
43. nformation http www pcworld com article 2010278 10 common mo bile security probiems to attack html po _ 165 babimu Fotolia com Wireless LAN Security Risks By Alan Hughes eHow Contributor Wireless networks are relatively easy and inexpen sive to set up today In addition to many businesses that have installed wireless LANs many people have installed wireless LANs in their homes and enjoy the benefits of connecting without cables Unfortunate ly the ease of wireless LAN and the nature of wireless technology may leave many users in homes and busi nesses with a network that is not secured exposing their personal and business information to a drive by cyber criminal War Drivers War driving is a term that describes driving around looking for wireless networks These cyber crooks dri ve through neighborhoods or business areas using their laptops to look for wireless network signals When they find a network that is not secured they attempt to hop on the connection Once on the net work they target vulnerable computers and hack into them if at all possible or just passively sniff the net work traffic looking for valuable information One so lution to this problem is to enable one of the wireless security methods on the wireless access point WEP wired equivalency protocol is the easiest to enable and should be activated and configured to achieve at least minimal security Rogue
44. ng a walking database babimu Fotolia com lt Caution sensitive aD All data related to us is considered sensitive data In the Austrian Data Protection Act Datenschutzgesetz such data is described as personal data personenbezogene Daten Some personal data is considered to be particularly sensitive What do you think which of the data listed below is sensitive data Data Yes nice EMEN EN EN Colour of eyes Colour of hair EE Date of birth EE Education occupation EE E mail address Favourite colour BEI Favourite dish Ell International certificate of vaccination IP address of the computer Marital status BEEN Membership in a political party BENE Membership in a sports association BEEN Membership in a trade union EN x is ER x ww Membership in an association for the support of equal rights of homosexuals Mobile phone number Name Nationality Religion Shoe size Taste in music Vote at the last election for the Austrian Parliament i A E Arbeitsblatt 5 2 smart Safe S FMK 68 Smart amp Safe FORUM MOBILKOMMUNIKATION 2 Caution sensitive Allergies E at the last election for Austrian Parliament Martial status trade union International certificate of yaccination Membership in an association for the support of equal ri
45. nicati ons provider may store and how such data may be used Stammdaten S 97 1 Stammdaten d rfen von Anbietern nur f r folgende Zwecke ermittelt und verwendet werden 1 Abschluss Durchf hrung Anderung oder Beendigung des Vertrages mit dem Teilnehmer 2 Verrechnung der Entgelte 3 Erstellung von Teilnehmerverzeichnissen und 4 Erteilung von Ausk nften an Notruftrager 2 Stammdaten sind sp testens nach Beendigung der vertraglichen Beziehungen mit dem Teilnehmer vom Betreiber zu l schen Ausnahmen sind nur soweit zul ssig als diese Daten noch ben tigt werden um Entgelte zu verrechnen oder einzubringen Beschwerden zu bearbeiten oder sonstige gesetzliche Verpflichtungen zu erf llen Ausk nfte an Betreiber von Notrufdiensten S 98 1 Betreiber eines Kommunikationsnetzes oder dienstes haben Betreibern von Notrufdiensten auf deren Ver langen Ausk nfte ber Stammdaten sowie ber Standortdaten zu erteilen In beiden Fallen ist Voraussetzung f r die Zul ssigkeit der bermittlung ein Notfall der nur durch Bekanntgabe dieser Informationen abgewehrt werden kann Die Notwendigkeit der Informations bermittlung ist vom Betreiber des Notrufdienstes zu dokumentieren und dem Be treiber unverz glich sp testens jedoch innerhalb von 24 Stunden nachzureichen Der Betreiber darf die bermittlung nicht von der vorherigen Darlegung der Notwendigkeit abhangig machen Den Betreiber des Notrufdienstes trifft die Verantwortung f r die rechtl
46. now who might have found my phone in percent 96 7 Have you ever received any unwanted advertising text messages c0 ode o in percent 06 percent 8 Do you have a smartphone Yo JEE in percent wor in percent 06 Portion of all respondent women who own a smartphone LOAN in 96 Eh Wall 96 I in percent EE in percent Portion of all resoondent women who are able to install apps on their mobile phone E percent 96 Portion of all resoondent men who able install apps their mobile phone nn ns in 96 50 babimu Fotolia com mn an Q a BS WU NOME
47. nt of electronic offers Obligatory privacy impact assessment could contribute thereto When collecting personal data the following prin ciple should always be followed As little as possible and only as much as necessary Monitoring institu tions should be established for surveillance systems Moreover citizens should be given simple access to the data stored about them Last but not least data protection authorities should be given more compe tences and resources Source of the German version of the text www wienerzeitung at nachrichten panorama chro nik 106034 Daten frei Haus html FORUM MOBILKOMMUNIKATION y 61 babimu Fotolia com y FORUM MOBILKOMMUNIKATION 72 Questions for analysis 1 What are the problems that the scientists mentioned in this article warn of 2 In your opinion which services and or offers are covered by the term electronic services 3 The article refers to personal data In your opinion what data is included 4 The article states several reasons why users handle their data carelessly What are those reasons 5 Can you think of some other reasons which might be responsible therefor 6 What possible solutions are stated in the article
48. nted to know about him He uses all the possibilities that Facebook and Twitter offer also Facebook Places every time he changes his profile his location is posted beside his profile Of course he does not leave his new cool smartphone at home during the family holiday He documents every tiny detail of the activities of the Wallner family far down in the South Arbeitsblatt 16 142 54 babimu Fotolia com mipan Fotolia com Smart amp Safe All safe This text is about security risks that may lure when mobile phones are used too carelessly Unfortunately a virus has sneaked in and has caused some chaos Can you match the correct terms with the descriptions of risks i Thanks to the development of mobile phones our life has become far more easier and more amusing We can do a lot more with a mobile phone than make phone calls Unfortunately this increase in possibilities of use has led to an increase in security risks However those who are familiar with those risks and know how to protect their data against misuse can use the full range of functionalities of modern mobile phones One potential security lapse are They enable not only an easy exchange of data but also are a door into your mobile phone If you do not close this door after the guests you expected have arriv
49. o access traffic data In cases of imminent danger such approval need not be obtained Every inquiry of retained data must be reported to a person responsible for legal protection Since 1 April 2012 mobile radio providers must store the following data for six months subscriber number or other ID of the calling terminal and of the called terminal inthe case of additional services such as call forwarding or call redirection the subscriber number to which the call is forwarded redirected name and address of the caller and of the person called date time of commencement and duration of a communication stating the underlying time zone the nature of the service used calls additional services messaging services and multimedia services International Mobile Subscriber Identity IMSI of the calling terminal and of the called terminal International Mobile Equipment Identity IMEI of the calling terminal and of the called terminal date and time of first activation of the service and the location ID cell ID at which the service was acti vated if pre paid anonymous services are concerned e thelocation ID cell ID at the beginning of a connection The contents of calls and messages as well as data on addresses visited on the internet still must not be stored 1 Which data is stored within the scope of retention of data J Content data J Master data J Location data r Traffic data 2 Forhow long must such data be stored 4
50. on Buy she not only ordered one ringtone but a full subscription SE Arbeitsblatt 22 s GU 189 babimu Fotolia com abbreviation access accounting purpose additional service approval of a court area as arule backup balance bargain battery call call forwarding call redirection caller commencement connection consent content data contract corresponding receiver data deserving special protection data protection authority data trace data traffic data volume duration emergency service EU Directive exchange of data factory reset free home frequency intersection legal protection master data message Smart amp Safe Vocabulary SS LA r lt Abkurzung misuse Zugriff mobile phone Rechnungszweck mobile radio provider Zusatzservice mobile radio station richterliche operating system Bereich personal data aus Prinzip phone memory Sicherung point to point radio Gutschrift public prosecutor Schnappchen radio cell Akku radio switching station Anruf radio wave Rufweiterleitung reception Rufumleitung Anrufer Beginn Verbindung Zustimmung Inhaltsdaten Vertrag Empfangsstation besonders schutzwurdige Daten Datenschutzbehorde Datenspur Datenverkehr Datenvolumen Dauer Notfalldienst EU Richtlinie Datenaustausch Werkseinstellung frei Haus Haufigkeit Schnittpunkt Rechtsschutz Stammdaten Nachricht
51. on drei Monaten die Entgelte nicht schriftlich beeinsprucht wurden Die Daten sind jedoch nicht zu l schen wenn 1 ein fristgerechter Einspruch erhoben wurde bis zum Ablauf jener Frist innerhalb derer die Abrechnung rechtlich angefochten werden kann 2 die Rechnung nicht beglichen wurde bis zum Ablauf jener Frist bis zu der der Anspruch auf Zahlung geltend gemacht werden kann oder 3 Verfahren ber die H he der Entgelte eingeleitet wurde bis zur endg ltigen Entscheidung 4 Dem Anbieter ist es au er in den in diesem Gesetz besonders geregelten F llen untersagt einen Teilnehmeran schluss ber die Zwecke der Verrechnung hinaus nach den von diesem Anschluss aus angerufenen Teilnehmernum mern auszuwerten Mit Zustimmung des Teilnehmers darf der Anbieter die Daten zur Vermarktung f r Zwecke der eigenen Telekommunikationsdienste oder f r die Bereitstellung von Diensten mit Zusatznutzen verwenden Inhaltsdaten 101 1 Inhaltsdaten d rfen sofern die Speicherung nicht einen wesentlichen Bestandteil des Kommunikations dienstes darstellt grunds tzlich nicht gespeichert werden Sofern aus technischen Gr nden eine kurzfristige Speiche rung erforderlich ist hat der Anbieter nach Wegfall dieser Gr nde die gespeicherten Daten unverz glich zu l schen Ausz ge aus dem Telekommunikationsgesetz Fassung 15 5 2013 zitiert nach www ris oka gv at GeltendeFassung Bundesnormen 20002849 TKG 202003 2c 20Fassung 20vom 2005 04 2
52. or instance does a game really need to be able to send premium text messages or access your contact list It helps to understand what each of the available And roid permissions mean and to check the apps already on your phone to spot excessive permission requests http edition cnn com 2011 TECH mobile 06 17 mobile security gahran index html 164 babimu Fotolia com Smart amp Safe L common mobile security problems to attack By Michael Cooney NetworkWorld When it comes to security most mobile devices are a target waiting to be attacked That s pretty much the conclusion of a report to Congress on the status of the security of mobile devices this week by watchdogs at the Government Accoun tability Office Mobile devices face an array of threats that take advan tage of numerous vulnerabilities commonly found in such devices These vulnerabilities can be the result of inadequa te technical controls but they can also result from the poor security practices of consumers the GAO stated Private companies and relevant federal agencies have taken steps to improve the security of mobile devices including making certain controls available for consumers to use if they wish and promulgating information about recommended mobile security practices However security controls are not always consistently implemented on mobile devices and it is unclear whether consumers a
53. ovides every mobile radio station with reception is also called a radio cell The individual radio stations are connected with a central radio switching station via point to point radio or cable This central switching computer knows the locations of all mobile phones that are turned on and forwards data from one radio cell to another and also to a different telephone network Thus your mobile phone and or the radio cell in which your mobile phone is located can be found within a few seconds Radio cells differ in size In urban areas with a high number of mobile radio subscribers and a high density of buildings there are many small radio cells This guarantees a good quality of the network and mobile radio stations and the mobile phone can work with the lowest possible transmission power In rural areas with a low number of mobile radio subscribers and many unbuilt areas there are larger radio cells Does the size of a radio cell affect the result of locating mobile phones If so why and in what form Words to help you mobile radio station Mobilfunkstation radio wave Funkwelle radio cell Funkzelle radio switching station Funkvermittlungsstation point to point radio Richtfunk subscriber Teilnehmer LA Arbeitsblatt 15 1 136 P N babimu Fotolia com NIE FORUM MOBILKOMMUNIKATION Smart amp Safe Calculation examples on the size of radio cells Every dot on
54. party even those with whom she otherwise is not so much in touch Long before the party Margit calls all persons to be invited and asks them for their addresses and e mail addresses to send them official invitations In addi tion she asks them to give her their mobile phone numbers so that she can reach the invited persons as quickly as possible if need be In this manner a considerable contact list of her relatives is created One week before the party Margit decides to contact all guests on the phone once more as a precaution To get this done more quickly she shares the list with her sister so that each of them only has to personally contact half of the list g Yes this is allowed under the Austrian Data Protection Act O No this is prohibited by the Austrian Data Protection Act Reason Top offer ata special price for friends Bernd P has been invited to a big birthday party He gets the latest information on the programme of the party by e mail which was erroneously sent to a disclosed mailing list As Bernd P is an insurance agent he takes the opportunity and uses these addresses to send all party guests an offer for a private pension fund Yes this is allowed under the Austrian Data Protection Act No this is prohibited by the Austrian Data Protection Act babimu Fotolia com Daniel Labs_pixelio de Paul Georg Meister_pixelio de First hand information en Nadine is a student at the University of Vienna In
55. re aware of the importance of enabling security controls on their devices and adopting recommen ded practices The GAO report came up with a list of mobile vulnerabilities it says are common to all mobile platforms and it offered a num ber of possible fixes for the weaknesses From the report Mobile devices often do not have passwords enabled Mobile devices often lack passwords to authenticate users and con trol access to data stored on the devices Many devices have the technical capability to support passwords personal iden tification numbers PIN or pattern screen locks for authenti cation Some mobile devices also include a biometric reader to scan a fingerprint for authentication However anecdotal information indicates that consumers seldom employ these mechanisms Additionally if users do use a password or PIN they often choose passwords or PINs that can be easily deter mined or bypassed such as 1234 or 0000 Without passwords or PINs to lock the device there is increased risk that stolen or lost phones information could be accessed by unauthorized users who could view sensitive information and misuse mo bile devices Wireless transmissions are not always encrypted Information such as e mails sent by a mobile device is usually not encryp ted while in transit In addition many applications do not en crypt the data they transmit and receive over the network making it easy for the data to be intercepted
56. s1no sid JI buip UBISINO ls S Iq JJ su1uouu 991Y aq 1snuu dell sesodund 10 sinou 1NOJ JUIM lt aq 1snuu AjIssad9U JO UNUM V Sala pue Jaysew uo ssed sjepiAoJd suone iunuJuJo29 o J9JSUeJ e UNS Jo AyISSadaU Jo U PIM D AI 2 1 SY Jaye JUO pue Ja sew uo ssed lt X e eJedaud pesn Aew SadIAJas O UO passed aq sese U JOPJO Ul JIeIJUOD e Jo uoneuluJulJ9 Joye pesn JOU 1snuJ 191SBIN SjuauJesnJsApe pues 0 JapJo UI 32043002 e JO Jaye Osje Je1se W xo sesodund 5 19470 O pjos 1 15 S 3IAJ S UO passed aq umouy uoud 1 y s y JO JO pue e JO uone o ay sne5 q aq ue ue J 3IAJ S UONEIIUNW
57. sed that an attacker could successfully distribute malware such as viruses Trojans Spyware and spam to lure users into revealing passwords or other confidential information Operating systems may be out of date Security patches or fixes for mobile devices operating systems are not always installed on mobile devices in a timely manner It can take weeks to months before security updates are provided to consumers devices Depending on the nature of the vulne rability the patching process may be complex and involve many parties The GAO report went on to state that connecting to an unse cured WiFi network could let an attacker access personal information from a device putting users at risk for data and identity theft One type of attack that exploits the WiFi net work is known as man in the middle where an attacker in serts himself in the middle of the communication stream and Steals information Communication channels may be poorly secured Having communication channels such as Bluetooth communications open or in discovery mode which allows the device to be seen by other Bluetooth enabled devices so that connections can be made could allow an attacker to install malware through that connection or surreptitiously activate a microphone or camera to eavesdrop on the user In addition using unsecured public wireless Internet networks or WiFi spots could allow an attacker to connect to the device and view sensitive i
58. ss thanks to help from space the solution is quite simple Max only needs to turn on his GPS mobile phone This mobi le phone sends on the same frequency like news satellites and therefore automatically receives their signals After a short period messages from two navigation satelli tes are received One from satellite Brisk which is six seconds away from Max and one from satellite Swift with three seconds distance After Brisk and Swift have announced their exact position and after their distance to Max has become clear thanks to the sig nal transit time Max s location can be determined easily If you imagine a circle around each satellite the radius of which is the distance between the satellites and Max Max is located at the intersection of those two circles on the Earth What is the advantage of locating mobile phones via satellite as compared to locating via radio cells Words to help you signal transit time Signallaufzeit intersection Schnittpunkt Arbeitsblatt 15 s 138 babimu Fotolia com Peter Atkins Fotolia com Kai Breker_pixelio de erysipel_pixelio de Thorben Wengert_pixelio de Carl Ernst Stahnke_pixelio de Gerd Altmann_pixelio de Dan Race Fotolia com FORUM MOBILKOMMUNIKATION NE y 4 3 d amp iiio N un N 4 a J uU LE YA v ge gt D Ld
59. t only my name and address but also some more personal details Otherwise the whole thing would make no sense love and collect store cards The special offers where one can make a bargain with them are simply great They make shopping much more fun often take part in discussions in internet forums Sometimes the topics are unimportant but sometimes there are heated debates on really important issues As can see no reason why should not stand by my opinion state my real name and my full contact data as a rule A rising number of bars and clubs send information about their events via text messages really like that as this always keeps me up to date always carry my mobile phone with me as it happens sometimes do not check my e mails for a day or two It would be a pity if missed a top event for that reason Words to help you sweepstake Gewinnspiel store card Kundenkarte bargain Schn ppchen St Arbeitsblatt 8 106 n Floriani Fotolia com fr 1 UN babimu Fotolia com N Media Images Fotolia com Stauke Fotolia com Thorsten Freyer_pixelio de Fl The mobile phone producer of data ata gt Erhaltene Anrufe Mama 0567 120 59 639 Bis sp ter Y Overheadfolie 6 NV 108 babimu Fotolia com FM FORUM MOBILKOMMUNIKA n Smart amp Safe Mobile daily record In Austria owners of mobile phones
60. ted but had also been passed on And Paul S now is afraid that he and his friends will in future receive loads of soam text messages and that his private photos may appear on any given websites Missed calls can be expensive Sandra S hardly could believe her eyes when she looked at her last mobile phone bill she had been charged EUR 30 for calls to value added service numbers which she just could not explain to herself She calmed down and called the billing hotline of her mobile radio provider Only when they asked for calls from unknown numbers she remembered the missed calls she had found on her mobile phone some time ago She had always tried to call back but had only reached weird answering ma chine loops Obviously she had called value added services without noticing it Her contact at the hotline offered her to block her mobile phone for value added service numbers 1 wa rs Arbeitsblatt 1 1 FORUM MOBILKOMMUNIKA Mh 39 babimu Fotolia com Yuri Arcurs Fotolia com Smart amp Safe Free app may be expensive Last week Isabelle F a student from Upper Austria fell victim to a malicious attack AS of mobile phone hackers Together with a free app she also received a free but un wanted Trojan which sent text messages to all her contacts without her noticing it Only when her classmates asked her why she sent empty text messages she became suspicious However she found no empty text message in her
61. the fourth term she writes her first term paper for which she also does some field research She prepares a questi onnaire on the topic The radio and its social significance in the Sixties of the twen tieth century and sends the same to various persons older than sixty years who agreed to take part in the survey For Nadine to be able to evaluate the data accor ding to various criteria the respondents also state data such as age sex and marital status However the results are anonymised so that the term paper does not state which persons were actually questioned and what answers they had given Two terms later Nadine uses the data of the radio survey once again for a different paper which is about the percentage of divorces in the 60 generation Again the evaluation is anonymised g Yes this is allowed under the Austrian Data Protection Act O No this is prohibited by the Austrian Data Protection Act Reason Research made easy Bernhard E is a student at the University of Vienna and has to write a research paper on the life situation of men above the age of 65 As he knows that his fellow student Nadine H has made interviews with many persons of that age group in a different context he asks her for the list of interview partners to call all men from the list and ask them whether he may interview them on his topic Nadine knows how difficult it had been to find people willing to take part in her survey on a voluntary basis
62. the map symbolises a mobile radio station which constitutes the centre of a radio cell Calculate for each map how many sq m and or sq km of area are shown on the relevant map section how sq m and or sq km of area an average radio cell in that map section has Map 1 radio antenna Scale 1 10 000 The map section shows an area Of sq m this corresponds to sq km There are mobile radio stations in the area shown on the map One radio cell has an average area of sq m this corresponds to sq km The map shows 0 rural area J urban area Map 2 O radio antenna Scale 1 65 000 The map section shows an area Of this corresponds to There are mobile radio stations in the area shown on the map One radio cell has an average area of this corresponds to The map shows 0 rural area J urban area J metropolitan area Map 3 O radio antenna Scale 1 240 000 map section SHOWS area of this corresponds to There are mobile radio stations in the area sho
63. vacy Leal Unforeseeable consequences Although many users are aware of how much per sonal information they disclose when using in formation and communication technologies one cannot expect them to be able to estimate long term consequences Therefore Walter Peissl of the ITA requests a higher degree of sensitivity of the users Words to help you free home frei Haus sky rocketing explodierend rasant ansteigend technological impact assessment Technikfolgenabsch tzung significance Stellenwert Bedeutung to bear in sich bergen data trace Datenspur to be aware of sich einer Sache bewusst sein to estimate absch tzen ermessen to request fordern to weigh something etwas abw gen requirement Anliegen to take into account ber cksichtigen to contribute something etwas beitragen to establish einrichten surveillance system Aufsichtsstelle data protection authority Datenschutzbehdrde N SE Arbeitsblatt 4 3 of electronic services as regards the issue of privacy In their project report the scientists found that the protection of privacy often is weighed against values such as comfort security economic advantages or social interaction The experts are convinced that many problems in connection with privacy could be avoided For this purpose the requirements of data protection must be taken into account at an earlier point of time i e already in the design and developme
64. w many apps are installed on your phone DO 0 O 1 5 O 6 10 J 11 15 J morethan 15 J I don t know 11 Which apps do you use most List your top three apps 12 What happens to apps you no longer use J Ikeep them on my mobile phone J Idelete them J Iwould like to delete them but don t know how to 13 What security measures have you taken for the case of a mobile phone loss or theft J lbackup my data periodically J Ihave activated my phone lock J Ihave noted the IMEI number St Arbeitsblatt 2 2 FORUM MOBILKOMMUNIKA Mh 45 babimu Fotolia com FORUM MOBILKOMMUNIKATION Smart amp Safe Miy mobile phone and me Evaluation 1 People asked Y CU in percent TEMA ense percent Yes in percent O NO 252526 __ _ percent Portion of all resoondent women who can access internet with their mobile phones percent Portion of all resoondent men who can access internet with their mobile phones of total in percent YO number of votes 4 What do you do if you do not need your mobile phone any more B ee USE IE percent 96 I ive itto o
65. wn on the map One radio cell has an average area of this corresponds to The map shows 0 rural area J urban area J metropolitan area Arbeitsblatt 15 2 137 babimu Fotolia com ping han Fotolia com Orlando Bellini Fotolia com FORUM MOBILKOMMUNIKATION Locating mobile phones via satellite A satellite system consists of satellites which orbit the Earth and send electromagnetic signals at the speed of light and receiving stations on the Earth which receive and evaluate those signals The systems can fulfil different tasks for example there are weather satellites that monitor the Earth and col lect data that can be used for weather forecasts television satellites broadcast television programmes Every satellite system is sending on different radio frequencies How is navigation done Every navigation satellite regularly sends its coordinates down to the Earth its name position and the time the signal is sent The recipient of this signal can calculate its own distance to the satellite from the time it takes to transmit the signal the so called signal transit time If the receiver receives signals from several navigation satellites it can not only determine its distance to those satellites but also its position on the Earth Max does not know where to go he is lost and there is no one around whom he could ask where he actually is Sounds hopele
66. xpensive Last week Isabelle F a student from Upper Austria fell victim to a malicious attack of mobile phone hackers Together with a free app she also received a free but un wanted Trojan which sent text messages to all her contacts without her noticing it Only when her classmates asked her why she sent empty text messages she became suspicious However she found no empty text message in her outbox Only when she called her mobile radio provider she learned that she had already exceeded the number of included free text messages and that approx 300 text messages had been sent from her mobile phone per day Hello here am Luke Matthew and Jacob three students from Deutschlandsberg had planned eve rything very well They started off on time in the morning and instead of going to school then went to the train station They took the 8 05 train and went to Graz they had planned to go shopping instead of attending school They had even thought of changing their Facebook status several times during their little trip always using similar phrases like feel sooo sick Thanks to their new smartphones this was no problem at all However they had overlooked the fact that on their Facebook sites they had activated the function to automatically detect their location and state it on their profile together with every new status message So their status messages read feel sooo sick however Graz and not their home town was stated as

Download Pdf Manuals

image

Related Search

Related Contents

OENOTANNIN FRAÎCHEUR  MIPRO MTG-100T  Mejanes n∞8-V4.indd - Mairie d`Aix-en  Whirlpool W10173324B User's Manual  Trust 15.4" Notebook Protection Sleeve  Electrolux FRIGIDAIRE F30WC19E User's Manual  EVBUM2070 - NB4L339MNGEVB Evaluation Board User`s Manual  MD3000    Epson PowerLite 96W  

Copyright © All rights reserved.
Failed to retrieve file